dblp.uni-trier.dewww.uni-trier.de

Peeter Laud

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
17EEPeeter Laud: On the computational soundness of cryptographically masked flows. POPL 2008: 337-348
16EEPeeter Laud, Long Ngo: Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. ProvSec 2008: 298-312
2007
15EEIlja Tsahhirov, Peeter Laud: Application of Dependency Graphs to Security Protocol Analysis. TGC 2007: 294-311
2006
14EEMichael Backes, Peeter Laud: Computationally sound secrecy proofs by mechanized flow analysis. ACM Conference on Computer and Communications Security 2006: 370-379
13EEAhto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson: Rational Choice of Security Measures Via Multi-parameter Attack Trees. CRITIS 2006: 235-248
12EEPeeter Laud, Tarmo Uustalu, Varmo Vene: Type systems equivalent to data-flow analyses for imperative languages. Theor. Comput. Sci. 364(3): 292-310 (2006)
2005
11EEPeeter Laud: Secrecy types for a simulatable cryptographic library. ACM Conference on Computer and Communications Security 2005: 26-35
10EEPeeter Laud, Varmo Vene: A Type System for Computationally Secure Information Flow. FCT 2005: 365-377
9EEAhto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson: Universally Composable Time-Stamping Schemes with Audit. ISC 2005: 359-373
2004
8EEPeeter Laud: Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries. IEEE Symposium on Security and Privacy 2004: 71-85
2003
7EEPeeter Laud: Handling Encryption in an Analysis for Secure Information Flow. ESOP 2003: 159-173
6EEPeeter Laud, Ricardo Corin: Sound Computational Interpretation of Formal Encryption with Composed Keys. ICISC 2003: 55-66
2002
5 Ahto Buldas, Peeter Laud, Helger Lipmaa: Eliminating Counterevidence with Applications to Accountable Certificate Management. Journal of Computer Security 10(3): 273-296 (2002)
2001
4EEPeeter Laud: Semantics and Program Analysis of Computationally Secure Information Flow. ESOP 2001: 77-91
2000
3EEAhto Buldas, Peeter Laud, Helger Lipmaa: Accountable certificate management using undeniable attestations. ACM Conference on Computer and Communications Security 2000: 9-17
1998
2EEAhto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson: Time-Stamping with Binary Linking Schemes. CRYPTO 1998: 486-501
1 Ahto Buldas, Peeter Laud: New linking schemes for digital time-stamping. ICISC 1998: 3-13

Coauthor Index

1Michael Backes [14]
2Ahto Buldas [1] [2] [3] [5] [9] [13]
3Ricardo Corin [6]
4Helger Lipmaa [2] [3] [5]
5Long Ngo [16]
6Jaan Priisalu [13]
7Märt Saarepera [9] [13]
8Ilja Tsahhirov [15]
9Tarmo Uustalu [12]
10Varmo Vene [10] [12]
11Jan Willemson [2] [9] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)